A tool which can be used for Forensic Investigations, Hacking, Backing up and Debugging of Android devices
Most of us use smart phones in our day to day lives either to take a call, send an SMS, browse internet, view mails or play games. Therefore Smartphone contain our personal information such as photos, videos, contact details, emails and SMS. Some of us even store usernames and passwords of mail addresses or of favorite web sites in our smart phones for ease of access. This certainly makes our lives easier but what will happen if someone steal your phone or you lose it. The person who receives it will have the full access to all of your personal information.
If you are a security concerned person, you may have locked your phone to protect it. But this lock can be easily broken by a person who knows his way around. For example, if you are using an Android phone, there is a really nice tool called ADB or the Android Debug Bridge which allows you to open a shell to access the Android device by issuing two three commands. And if your phone is rooted, this shell can be easily created with super user permission thus allowing the full control of the device.
Even though there are many uses, the most interesting use of ADB is its ability to capture and retrieve databases in the Android Phone. Android Stores all of its information such as Contacts, SMS, Usernames and Passwords in SQLite databases. If the phone is rooted, ADB can be used to easily download these databases to your PC and to analyze them to capture the information stored in them. Following image show how acquiring Contacts Database is done and a snapshot of the content inside the database.
As the above table shows, it is possible to acquire all the contacts in the contact database. Furthermore deleted contacts which were deleted several days ago can also be found using SQLite Forensic tools such as epilog.
Not only Contact Details, but much other information such as SMS, Call Logs, Web History, emails, Geo Tags and even saved usernames and passwords can be easily acquired using ADB (Those acquired information are represented at the end of the post). The interesting part is that even the general lock that you put into your phone will not work in this scenario to secure your information since ADB directly access the Kernel module.
Getting information is not only the end of what a hacker can do using ADB. Once the databases are obtained it is possible to write cracks and malicious triggers to those databases and then upload them back again to the Smartphone making it more vulnerable and allowing hackers to obtain any information at any time they want.
Even though all of the above talk make ADB looks bad, ADB, however is not only a tool used by hackers to exploit Android, but it is a tool which helps developers to debug the Android Kernel. Furthermore it can be used widely for Forensic Investigations and for taking backups of the information.
ADB can be used to find and carve forensic information from the phone by investigators through the ADB Shell. Furthermore experienced users can use ADB to backup their SMS and contact databases to their PCs while Developers can run, test and debug their applications using ADB. Therefore ADB can be defined as a tool which can be used for both the good and bad.
As users, it is our own responsibility to make sure that malicious users cannot use ADB on our Android devices to gather our personal information. The way to do this is also simple, we only have to turn off USB Debugging mode (Settings > Applications > Development) of the Android Phone and to put a lock to the phone restricting others from turning this option back on. This is a very simple yet effective method, but most of the people leave this option on mainly because of their ignorance.
Even though smart phones are really useful for us in many ways, they can present certain security risks as mentioned above, possibly because of the ignorance of the users. Therefore it is a must for all of us to learn how to use smart phones securely protecting our personal information.
Following are some of the information gathered using ADB from a Smartphone
SMS extracted from the Message
Call Logs extracted from the Message
Extracted Browsing History and Bookmarks
Extracted Google Search Results
Extracted passwords and usernames in clear text
Extracted email credentials in clear text
Samples of extracted emails
Extracted Geo Information
Subscribe to our mailing list and get interesting stuff and updates to your email inbox.
Workshop Agenda - The main purpose of the workshop is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to
Workshop Agenda –
The main purpose of the workshop is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning and big data.
Module 1: Introduction to Machine Learning
This module introduces machine learning and discussed how algorithms and languages are used.
· What is machine learning?
· Introduction to machine learning algorithms
· Introduction to machine learning languages
Module 2: Introduction to Azure Machine Learning
Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio.
· Azure machine learning overview
· Introduction to Azure machine learning studio
· Developing and hosting Azure machine learning applications
Module 3: Managing Datasets
At the end of this module, the student will be able to explore various types of data in Azure machine learning.
· Categorizing your data
· Importing data to Azure machine learning
· Exploring and transforming data into Azure machine learning
Module 4: Building Azure Machine Learning Models
This module describes how to use regression algorithms and neural networks with Azure machine learning.
· Azure machine learning workflows
· Using regression algorithms
· Using neural networks
Module 5: Using Azure Machine Learning Models
This module explores how to provide end users with Azure machine learning services, and how to share data generated from Azure machine learning models.
· Deploying and publishing models
· Consuming Experiments
Module 6: Using Cognitive Services
This module introduces the cognitive services APIs for text and image processing to create a recommendation application, and describes the use of neural networks with Azure machine learning.
· Cognitive services overview
· Processing language
· Processing images and video
· Recommending products
Register URL –
FB Event page-
(Tuesday) 12:00 am - 11:59 pm
Blue Chip Training0716092918
Discover new dimensions in connecting the Internet of Things with Narrowband IoT technology at the NB-IoT Forum and Hackathon, organized by Mobitel. Date - 23rd March 2018 at Trace Expert City
Discover new dimensions in connecting the Internet of Things with Narrowband IoT technology at the NB-IoT Forum and Hackathon, organized by Mobitel.
Date – 23rd March 2018 at Trace Expert City – Colombo 10.
Entrance – Free for a limited number of participants.
Register now – https://goo.gl/3cRdHJ
(Friday) 9:00 am - 5:00 pm
Trace Expert City
Maradana Rd, Colombo
Tech Coders V1.0 will be an online 12-hour problem solving competition. During this 12-hour period your problem solving skills will be put to the test through a series of questions. Competition
Tech Coders V1.0 will be an online 12-hour problem solving competition. During this 12-hour period your problem solving skills will be put to the test through a series of questions.
Competition will be conducted on HackerRank.
*Please note that you will be given access to the contest on HackerRank only if you fill this form on or before 11.59 pm on 22nd March (Thursday).
Organized by : Tech Seekers – Sri Lankan Community
24 (Saturday) 8:00 pm - 25 (Sunday) 8:00 am
One on one talk , Q&A and networking session with Manju Nishshanka,Founder and CEO,KRMG Capital. Mr.Nishshanka is a serial entrepreneur with extensive experience in financial markets and disruptive technologies.He has founded
One on one talk , Q&A and networking session with Manju Nishshanka,Founder and CEO,KRMG Capital.
Mr.Nishshanka is a serial entrepreneur with extensive experience in financial markets and disruptive technologies.He has founded and invested in several successful startups in fintech,blockchain ,AI,AR & VR and social media sectors.
He is a keynote speaker at the Digital Asset Investment Forum (DAIF 2018) and also serves on the board of NYU stern Blockchain and digital asset forum.
KRMG capital is an investment and advisory firm focused on early and growth staged startups and digital assets.
University of Sri Jayawardenepura,Sri Lanka partnered with KRMG capital to establish the first ever blockchain laboratory in Sri Lanka.
This will be an eyeopener to the vast potential and opportunities in Blockchain,Digital assets and Cryptonomics.
All are welcome to join the event and the networking session.
(Wednesday) 6:30 pm - 8:30 pm
Lakshman Kadirgamar Institute
Horton Place, Colombo 00700
Chandimal alahakoon 077 22 44 905
Subscribe to our mailing list and get interesting stuff and updates to your email inbox.